87%(15)13 out of 15 people found this document helpful
This preview shows page 15 - 20 out of 25 pages.
56. Access control in an on-line CBIS can best be provided in most circumstances bya. An adequate librarianship function controlling access to files. b. A label affixed to the
outside of a file medium holder that identifies the contents. c. Batch processing of all
input through a centralized, well-guarded facility. d. User and terminal identificationcontrols, such as passwords.ANSWER: D57. While entering data into a cash receipts transaction file, an employee two numbers in a customer code. Which of the following controls could prevent input ofthis type of error?transposed58. What is the computer process called when data processing is performedconcurrently with a particular activity and the results are available soon influence the particular course of action being taken or the decision being made?enough to59. Reconciling processing control totals is an example of60. A disadvantage of auditing around the computer is that ita. Permits no assessment of actual processing. b. Requires highly skilled auditors. Demands intensive use of machine resources. d. Interacts actively with auditeeapplications.ANSWER: Ac.61. The completeness of computer-generated sales figures can be tested by comparingthe number of items listed on the daily sales report with the number of items billed onthe actual invoices. This process uses62. Which of the following controls would be most efficient in reducing input errors?common data63. On-line real-time systems and electronic data interchange systems have theadvantages of providing more timely information and reducing the quantity ofdocuments associated with less automated systems. The advantages, however, create some problems for the auditor. Which of the following characteristics systems does not create an audit problem?mayof thesefor greater